Agent launcher and tmux orchestrator for Obsidian vault workflows.
Project description
Vaultsmith
AI for Obsidian that works like the vault owner, not like a generic note bot.
Vaultsmith is a local agent launcher and review-first workflow for Obsidian vaults. It sets up vault-local instructions, starts codex or claude inside tmux, and gives the agent a constrained operating surface so note creation and organization can stay consistent with how the vault already works.
Why Vaultsmith exists
Most AI note tooling can generate text.
What it usually does badly:
- titles notes in a way that does not match the vault
- picks the wrong folder
- ignores linking habits and structure conventions
- rewrites too much when a small edit would do
- makes users manually clean up the result afterward
Vaultsmith exists to push the agent in the opposite direction:
- inspect the vault before making style claims
- prefer minimal edits over broad rewrites
- keep proposals short and reviewable
- treat vault conventions as a first-class constraint
- make approval explicit before applying edits
What it does today
Vaultsmith currently ships a practical local workflow:
- initializes a vault-local
.vaultsmith/workspace - writes role prompts and bootstrap instructions for Codex and Claude
- launches agent sessions in
tmux - defaults to a review-first flow with proposal and receipt files
- lets you inspect status, tail output, approve, and apply
- keeps a small vault memory file for durable conventions
It is intentionally narrow right now. The current product is a launcher and guardrail layer for agent-driven vault work, not a full autonomous vault intelligence system yet.
Core idea
Vaultsmith should help an agent behave more like the person who owns the vault.
That means the agent should learn and respect signals such as:
- naming patterns
- folder placement habits
- heading structure
- bullet and checklist style
- link and tag behavior
- frontmatter usage
- note family conventions
The long-term direction is simple: when Vaultsmith creates or reorganizes a note, it should feel native to the vault immediately.
Quick start
Requirements:
- Python 3.11+
pipxtmux- at least one supported agent CLI on
PATH:codexorclaude
One-line install path
Today, the shortest install path is directly from GitHub:
pipx install git+https://github.com/ronut01/Vaultsmith.git
vsm setup ~/Obsidian/MyVault
cd ~/Obsidian/MyVault
vsm run -- "정리해줘"
Why pipx is the default
Vaultsmith is a CLI tool, not a library. pipx is the cleanest default because it installs the command into an isolated environment without making users create a project virtualenv just to try the tool.
If you prefer pip, install Vaultsmith into a virtual environment:
python -m venv .venv
source .venv/bin/activate
python -m pip install git+https://github.com/ronut01/Vaultsmith.git
Install for local development
If you are working on Vaultsmith itself:
git clone https://github.com/ronut01/Vaultsmith.git
cd Vaultsmith
python -m venv .venv
source .venv/bin/activate
python -m pip install -e . pytest
Distribution status
Vaultsmith is not published to PyPI yet.
The intended release path is:
pipx install vaultsmithfor end userspython -m pip install vaultsmithinside a virtualenv for users who preferpip
First commands
Interactive session:
vsm chat
One-shot request:
vsm run -- "현재 정리 안 된 노트 정리해줘"
Review-first workflow
Vaultsmith is designed so the agent proposes work before it applies work.
Typical flow:
vsm run -- "강의 영상 링크 정리해줘"
vsm review
vsm approve
vsm apply
Useful follow-up commands:
vsm status
vsm tail
vsm sessions
vsm resume <session-id>
Behavior notes:
vsm runattaches by default so you can respond to trust prompts and other interactive agent questionsvsm run --detach -- "..."keeps the run in the background and prints recent tmux outputvsm applydoes not patch files itself; it re-dispatches the approved session to the underlying agent and then expects areceipt.md
What gets written into a vault
Running vsm setup <vault> creates a small control plane inside the target vault:
.vaultsmith/
config.toml
instructions/
codex.md
claude.md
memory/
vault-summary.md
roles/
input-agent.md
vault-analyst.md
research-scout.md
draft-agent.md
consistency-reviewer.md
sessions/
<session-id>/
session.json
proposal.md
approval.md
receipt.md
changes.json
AGENTS.md
CLAUDE.md
Session files matter:
session.json: metadata, mode, runtime state, approval stateproposal.md: short proposed plan and draft output before edits are appliedapproval.md: approval checkpointreceipt.md: short execution summary after applychanges.json: proposed operations payload when the session provides one
Command overview
vsm setup <path> # initialize Vaultsmith in a vault
vsm chat [path] # start an interactive agent session
vsm run [path] -- "..." # start a one-shot request
vsm status [session-id] # inspect current or selected session
vsm tail [session-id] # show recent tmux output
vsm review [session-id] # print proposal.md
vsm approve [session-id] # mark session approved
vsm apply [session-id] # dispatch approved work
vsm sessions # list recent sessions
vsm resume <session-id> # re-attach to tmux session
vsm alias enable vs # install a shorthand shell alias
Philosophy
Vaultsmith is opinionated in a few ways.
1. Inspect before generating
The vault is the source of truth. The agent should look at local evidence before inventing a structure or style.
2. Small context beats full-vault scans
For most requests, a few relevant notes are better than a noisy global survey.
3. Review before apply
Users should be able to inspect, reject, or refine proposed changes before the agent edits the vault.
4. Minimal edits over dramatic rewrites
Most vault work is maintenance, not greenfield writing. The safe default is a narrow change.
Current scope vs. direction
Current scope:
- local CLI
- tmux-backed agent launch
- vault bootstrap files
- review-first session workflow
- basic session state and approval handling
Planned direction:
- stronger vault-style profiling
- better note placement and naming inference
- more explicit explanation for why a note was titled or placed a certain way
- better support for recurring note families like meetings, research notes, and project updates
Development
Run tests:
cd Vaultsmith
source .venv/bin/activate # or the virtualenv you use for local development
pytest -q
Smoke test against a temporary vault:
mkdir -p /tmp/vsm-smoke-vault
vsm setup /tmp/vsm-smoke-vault
cd /tmp/vsm-smoke-vault
vsm run -- "테스트 노트를 하나 만들고 지금 vault 상태를 설명해줘"
Status
Vaultsmith is early, but the direction is deliberate.
The goal is not to bolt AI onto Obsidian. The goal is to make an agent operate inside a vault with enough structure, memory, and review pressure that the output starts to feel like it belongs there.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file vaultsmith-0.1.0.tar.gz.
File metadata
- Download URL: vaultsmith-0.1.0.tar.gz
- Upload date:
- Size: 19.8 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
1222427df5b215f6e267dad00f86b717b97e296d1df64840eedeeb2375f2f25b
|
|
| MD5 |
e7bc4eace9118f2bf03d4fd129f9dfd5
|
|
| BLAKE2b-256 |
a605ea2911826bf589dd195944b7300166b85289e1223ae5a4814f521e2b86a4
|
Provenance
The following attestation bundles were made for vaultsmith-0.1.0.tar.gz:
Publisher:
publish.yml on ronut01/Vaultsmith
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
vaultsmith-0.1.0.tar.gz -
Subject digest:
1222427df5b215f6e267dad00f86b717b97e296d1df64840eedeeb2375f2f25b - Sigstore transparency entry: 1180958044
- Sigstore integration time:
-
Permalink:
ronut01/Vaultsmith@c487e638fab231fff06b6e130d4d877dbc97c3d1 -
Branch / Tag:
refs/tags/v0.1.0 - Owner: https://github.com/ronut01
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish.yml@c487e638fab231fff06b6e130d4d877dbc97c3d1 -
Trigger Event:
push
-
Statement type:
File details
Details for the file vaultsmith-0.1.0-py3-none-any.whl.
File metadata
- Download URL: vaultsmith-0.1.0-py3-none-any.whl
- Upload date:
- Size: 14.7 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
81a19ea321b8abcf9272758db0117c1b0f203d2b026f30781b11c3b5462eb693
|
|
| MD5 |
5abc994106d5604ab34bcd3eae0ae8d8
|
|
| BLAKE2b-256 |
c498b12c5562e9eb09aa7e98ef76c845fe2e6a042dc7145a4c0b4a22510c8604
|
Provenance
The following attestation bundles were made for vaultsmith-0.1.0-py3-none-any.whl:
Publisher:
publish.yml on ronut01/Vaultsmith
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
vaultsmith-0.1.0-py3-none-any.whl -
Subject digest:
81a19ea321b8abcf9272758db0117c1b0f203d2b026f30781b11c3b5462eb693 - Sigstore transparency entry: 1180958048
- Sigstore integration time:
-
Permalink:
ronut01/Vaultsmith@c487e638fab231fff06b6e130d4d877dbc97c3d1 -
Branch / Tag:
refs/tags/v0.1.0 - Owner: https://github.com/ronut01
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish.yml@c487e638fab231fff06b6e130d4d877dbc97c3d1 -
Trigger Event:
push
-
Statement type: